Thursday, November 28, 2019

Too Much Punch For Judy Essay Example For Students

Too Much Punch For Judy Essay The play we have been studying is called Too Much Punch For Judy. It is about two sisters who go out drinking and both get drunk. They have to decide who will drive home, Judy decides she should as she has not drunk as much and if they get aught Joanne will lose her licence. So they get in the car, and suddenly Judy loses control and they rash. Judy is OK, but Joanne is dead. Then the story explores how Judy might cope with life after that horrible night. In our lessons we took pieces of the play, and acted them out using different techniques, such as frozen images, abstract and form theatre.  In one lesson we used frozen images to show how attitudes towards alcohol progress. The sketches show how we were stood, and the numbers of the scene.  Ã‚  In this scene are me and Sabrina leaning on a double height rostra, drinking and laughing. In this we are in a having a laugh situation with the alcohol.  2. In this scene are Harry and Tara driving a car while drunk. In this they are using chairs as car seats. They are about to crash and at this point the serious consequences of alcohol start to show. We will write a custom essay on Too Much Punch For Judy specifically for you for only $16.38 $13.9/page Order now 3. In this scene are Danielle, Gemma and Hannah. They still use the chairs as car seats, but now only Danielle is in the car and she is drooped over the seat dead. Then Hannah is holding Gemma back from the scene to the left side. This is showing the seriousness of alcohol and the situations that can follow.  These frozen images showed how drinking can start off as a laugh but can be fatal. I found that it helped me understand the play better, as it showed me how the atmosphere and emotions developed from such a light-hearted beginning. In another lesson we used marking the moment to add effect, in the part of the play before the accident when Judy and Joanne are drunk. In this me and Rosalia acted drunk and tipsy. We showed this by walking in a drunken manner. While we were walking to the car we were talking rubbish about a fit guy. Then when we reached the car we argued about who would drive, then I tried to open the door with the wrong key, and let (Rosalia) Judy drive. Then I walked around the car drunk and kicked it. We both got in and I found some alcohol, and then said Thank God for that, about the bottle. Then as (Rosalia) Judy turned the car on she said Look at you, its a good thing Im driving. Then she cant start the car as she misses the keyhole. The point at which we marked the moment was when Rosalia said Look at you, its a good thing Im driving. What we did was freeze, as she was about to say it, just after I say about the bottle I find. Then while we were frozen she says it, and then we carry on. Marking the moment meant it showed the audience that something was about to happen, and therefore adds tension by the way Rosalia says her line in a drunken manner. It is also ironic, as it is not a good thing that shes driving.  This exercise helped me understand the play more, as it showed what can happen from a tiny misjudgement. In another lesson we used Emotion exercises to really show the emotions of our characters. In my group were Sarah and Holly, and we were given number three. This meant that we had to perform a scene where there are three friends, where two betray the other one.  In this me and Holly basically tease Sarah about her wetting the bed, after she told me not to tell anyone about her secret. In this I used two main facial expressions, and a happy laughing one when before we see Sarah and I tell Holly the secret, then again after we tease her. The other facial expression is a faking upset not guilty look, which I used when Sarah asked me if I had said anything. I also used my body language, one way was a huddled up, giggly manner when I was talking to Holly. Then as soon as Sarah came along I stood up as tall as possible to show that Im more important and stronger than her, to show status. .u895f8db1ec04929f9ed1672d0ff9a358 , .u895f8db1ec04929f9ed1672d0ff9a358 .postImageUrl , .u895f8db1ec04929f9ed1672d0ff9a358 .centered-text-area { min-height: 80px; position: relative; } .u895f8db1ec04929f9ed1672d0ff9a358 , .u895f8db1ec04929f9ed1672d0ff9a358:hover , .u895f8db1ec04929f9ed1672d0ff9a358:visited , .u895f8db1ec04929f9ed1672d0ff9a358:active { border:0!important; } .u895f8db1ec04929f9ed1672d0ff9a358 .clearfix:after { content: ""; display: table; clear: both; } .u895f8db1ec04929f9ed1672d0ff9a358 { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .u895f8db1ec04929f9ed1672d0ff9a358:active , .u895f8db1ec04929f9ed1672d0ff9a358:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .u895f8db1ec04929f9ed1672d0ff9a358 .centered-text-area { width: 100%; position: relative ; } .u895f8db1ec04929f9ed1672d0ff9a358 .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .u895f8db1ec04929f9ed1672d0ff9a358 .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .u895f8db1ec04929f9ed1672d0ff9a358 .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .u895f8db1ec04929f9ed1672d0ff9a358:hover .ctaButton { background-color: #34495E!important; } .u895f8db1ec04929f9ed1672d0ff9a358 .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .u895f8db1ec04929f9ed1672d0ff9a358 .u895f8db1ec04929f9ed1672d0ff9a358-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .u895f8db1ec04929f9ed1672d0ff9a358:after { content: ""; display: block; clear: both; } READ: I Search Rough Draft On Research EssayI used my voice when me and Holly were whispering and giggling I used a low pitch and tone, fast pace and low volume to show how much of a secret it was. Then immediately after I used my voice in a giggling way to show how evil and devious we were. Then the other way I used my voice was when Sarah asked us what we were talking about, and we both used a high pitch, loud and hesitant voice. We used these as we thought the hesitation showed we had to think and make up what we were saying, and a high, loud pitch to show the shocked, lying side.

Monday, November 25, 2019

An Excerpt from Classic Monologue Oedipus the King

An Excerpt from Classic Monologue Oedipus the King This Greek tragedy by Sophocles is based on the ancient legend of a fallen hero.  The story has several interchangeable names including  Oedipus  Tyrannus, Oedipus Rex, or the classic,  Oedipus the King.  First performed around 429 BC, the plot unfolds as a murder mystery and political thriller that refuses to reveal the truth until the end of the play. The Mythic Tragedy Although it was crafted thousands of years ago, the story of Oedipus Rex still shocks and fascinates readers and audience members alike. In the story, Oedipus rules over the kingdom of Thebes, yet all is not well. Throughout the land, there is famine and plague, and the gods are angry. Oedipus vows to find out the source of the curse. Unfortunately, it turns out that he is the abomination. Oedipus is the son of King Laius and Queen Jocasta and unknowingly marries his mother, who he ends up having four children with. In the end, it turns out that Oedipus has also murdered his father. All of this, of course, was unbeknownst to him. When Oedipus discovers the truth of his actions, he is wrought with horror and self-loathing. In this monologue, he has blinded himself after witnessing his wife’s suicide. He now devotes himself to his own punishment and plans to walk the earth as an outcast until the end of his days. What Readers Can Take Away from Oedipus the King The significance of the story surrounds the character development around Oedipus as a tragic hero. The suffering he endures as he goes on his journey in search for the truth is different from his counterparts who have killed themselves, like Antigone and Othello.  The story can also be seen as a narrative around family ideals about a  son who is competing with his father for his mothers attention. The ideals set by Greek society are challenged by the Oedipus character. For example, his personality characteristics such as  stubbornness and anger are not that of the idealized Greek man.  Of course, the theme around fate is central as the gods have willed it toward Oedipus. It is only until he is king of the land that he learns about his dark past. Although he was a model king and citizen, his complexity allows him to be labeled as a tragic hero. An Excerpt of the Classic Monologue from Oedipus the King The following excerpt from Oedipus is reprinted from Greek Dramas. I care not for thy counsel or thy praise;For with what eyes could I have eer beheldMy honoured father in the shades below,Or my unhappy mother, both destroyedBy me? This punishment is worse than death,And so it should be. Sweet had been the sightOf my dear childrenthem I could have wishedTo gaze upon; but I must never seeOr them, or this fair city, or the palaceWhere I was born. Deprived of every blissBy my own lips, which doomed to banishmentThe murderer of Laius, and expelledThe impious wretch, by gods and men accursed:Could I behold them after this? Oh no!Would I could now with equal ease removeMy hearing too, be deaf as well as blind,And from another entrance shut out woe!To want our senses, in the hour of ill,Is comfort to the wretched. O Cithaeron!Why didst thou eer receive me, or received,Why not destroy, that men might never knowWho gave me birth? O Polybus! O Corinth!And thou, long time believed my fathers palace,Oh! what a foul disgrace to human natureDidst thou receive ben eath a princes form!Impious myself, and from an impious race.Where is my splendor now? O Daulian path!The shady forest, and the narrow passWhere three ways meet, who drank a fathers bloodShed by these hands, do you not still rememberThe horrid deed, and what, when here I came,Followed more dreadful? Fatal nuptials, youProduced me, you returned me to the wombThat bare me; thence relations horribleOf fathers, sons, and brothers came; of wives,Sisters, and mothers, sad alliance! allThat man holds impious and detestable.But what in act is vile the modest tongueShould never name. Bury me, hide me, friends,From every eye; destroy me, cast me forthTo the wide oceanlet me perish there:Do anything to shake off hated life.Seize me; approach, my friendsyou need not fear,Polluted though I am, to touch me; noneShall suffer for my crimes but I alone. Source: Greek Dramas. Ed. Bernadotte Perrin. New York: D. Appleton and Company, 1904

Thursday, November 21, 2019

Critical Incidents Response Assignment Example | Topics and Well Written Essays - 1250 words

Critical Incidents Response - Assignment Example ense to establish agencies that control data centers in the states/cities and who can be of assistance when a state is under duress, whether medical, weather-related or physiological. Such agencies do exist, but have yet to pick up speed as was shown up in the tragic carnage in Virginia Tech. This Paper examines how the national grid has been networked and its command and control set up. In any data gathering and collating agency, the inputs can be inundating in volume, with a high level of irrelevance. All the same, every bit of information must be considered as actionable intelligence until proved otherwise. ‘Analysis must be objective and independent of political considerations. Since no single Agency has the ability to cater to the variability, pace, activity level and anticipated quantum of demands of information and its analyses, it must utilize distributed expertise, regardless of where in the Intelligence Community (IC) this expertise is. Collaboration must the norm in the IC, overcoming technical, policy and administrative barriers. The analytical process must be transparent, with logical argumentation and evidence-supported analyses. If intelligence gaps cannot be covered within the IC, the IC must tap external expertise to obtain relevant data, even if international agencies are to be involved’ (www.fas.org). As far as practicable, data and a nalysis sharing must be in real time and all operating agencies and operators data-linked. In an emergent situation, one of the most critical information systems is the Public Information System. ‘The US National Incident Management System (NIMS) requires that public information be organized around a Joint Information System (JIS) that is overseen by the Public Information Officer (PIO). The Public Information Officer (PIO) represents and advises the Incident Commander on all public information matters relating to the management of the incident. The PIO handles: The PIO also oversees other functions required

Wednesday, November 20, 2019

Unique Properties of Money Case Study Example | Topics and Well Written Essays - 250 words

Unique Properties of Money - Case Study Example Pouches of mackerel acted as money in prisons after cigarettes were banned by the prison authorities Pouches of mackerel were easily transferable from one place to another meaning they were portable. Cans were banned by wardens as a means of exchange, so prisoners turned to plastic pouches of mackerel. These were easily transferable around prison walls. Just like ideal money, the pouches of mackerel, plastic or can, were durable. They could be used for a long period without diminishing in value and quality. The pouches of mackerel cost about $ 1 at the commissary. Rather than, eat them, prisoners preferred to use them as money for trade. This means that their opportunity cost is low just like ideal money. Instead of eating them, prisoners derived a greater satisfaction in using them as a means, to trade for goods and services they needed much more. Their uniform value also made them as the preferred means of exchange in prison where ideal money was not available (McEachern, 2012). Money is characterized by almost non-existent fluctuation in value. The pouches of mackerel acted simil arly as their value remained uniform over a length of time. Similar to ideal money, the pouches of mackerel did not wear out quickly, were easy to carry and move around. They could be exchanged easily to support a range of prices and had uniform quality. There were few resources tied in creating the pouches and people were willing to accept them in believe that they would hold their  value.  

Monday, November 18, 2019

Your Logical Analysis for Better Understanding and Living Essay

Your Logical Analysis for Better Understanding and Living - Essay Example The understanding and living of a better life depends on the ability for one to understand what they want in life and focus on achieving those goals. Securing a better life starts with making the right choices for college and picking the right career path. These decisions are based on interests and strengths of an individual. I have to understand my interests and passions before choosing a career that best fits these interests. Based on my interests and strengths, I should make a decision on what I would want to study or major in college before deciding the right college for offering the course. Having information on the major or career will be helpful in getting a college that specializes in that particular field. I would develop a criterion for selecting colleges based on factors such as degrees offered, location, costs, graduation rate and financial assistance packages. From the criteria, I can come up with a list of possible colleges and universities. Visiting the schools before making the decision to study there may also be helpful. Choosing the right career and college that offers that course is the first step to securing a bright and better life in future. Time management is necessary because once lost, time is unrecoverable. Part of my understanding of living a better life is to manage my time. Time management not only improves the balance of life but also ensures a quality life. After understanding that time management is life management, I have to develop ways to manage my time by exercising self-discipline. Time management can lead to a better life because it minimizes stress and improves the overall quality of life. I start by laying a foundation for managing my time by delegating appropriate time for every activity I carry out in the day. I also have to identify and evaluate how I am spending my time currently to know where to make the adjustments. To manage my time I ensure that everything moves according to schedule. Anything done out of

Friday, November 15, 2019

Understanding The Dell Direct Distribution Channel Commerce Essay

Understanding The Dell Direct Distribution Channel Commerce Essay The direct model refers to the fact that Dell does not use the retails channel, but sells its PCs directly to customers through its website, this way the intermediary steps that may add time and cost are eliminated, and Dell is directly linked to its customers. The direct approach allows Dell to build a relationship, which makes it quick and easy for customers to do business with Dell. Supplier DELL Final Customer The build-to-order model enables Dell to keep inventory down very low compared to competitors like Compaq and IBM. Dell has a low inventory of five to ten days, while Compaq and IBM have inventory of four weeks or more. Dell purchases a significant number of components from single sources. In some cases, alternative sources of supply are not available. In other cases Dell may establish a working relationship with a single source, even when multiple suppliers are available, if the company believes it is advantageous to do so when considering performance, quality, support, delivery, capacity and price (Annual Report, 1996). If the supply of a critical single-sourced material or component were delayed or curtailed, Dells ability to ship the related product in desired quantities and in a timely manner could be adversely affected. Even where alternative sources of supply are available, qualification of the alternative suppliers and establishment of reliable supplies could result in delays and a possible loss of sales, which could affect operating results adversely (Annual Report, 1996). An Event:- On 21 September 1999, an earthquake of magnitude 7.6 struck Chichi, Taiwan. It had devastating consequences. Baum (1999) reports that after the disaster more than 2,200 people lost their lives, more than 50,000 buildings were destroyed and total industrial production losses were estimated as $1.2 billion. This area features high production concentration of many other computer components, e.g. motherboards (more than two-thirds of world consumption in 1999) and notebook displays. Local producers of computer memory, TSMC and UMC being the leading Taiwanese suppliers, lost significant quantities of work in progress at the time of the earthquake. Sherin and Bartoletti (1999) report that production lines could not restart at the first couple of days after the event as sensitive critical-path equipment had been damaged. The world markets of memory chips reacted very fast to this news, as supply was constrained at the last part of 1999. The spot price of memory chips went up fivefold. computer memory increases were not passed on to consumers as higher product prices, but they were absorbed by the company and were passed on to investors in the form of less stock repurchases. Dell Computer Co. (2000a) announced that during the fourth quarter of 1999 it lost $300 million in revenue due to the Earthquake. Literature Review The global presence of DELL with sales offices in 43 countries, sales presence in 170 countries, 6 global manufacturing sites in Brazil, Tennessee, Texas, China, Ireland and Malaysia clearly defines its leading position in the computer systems market. The annual revenue for Dell Inc was $ 61.8 Billion (FY 2008- 2009). By cutting .the middle man and building PCs, enterprise products like servers, storages, solutions to order, Dell has revolutionized an industry once inundated with unsold inventory and products that quickly became obsolescent. Dells integrated supply chain has allowed it to gain market share while remaining profitable. Dells business strategy includes direct route to market, Supplier relationship and E- Commerce. Dell Direct Model Supplier Relationship (Just In Time Strategy) E- Commerce Direct Model: Dells business model is the envy of many competitors. Most other competitors are in the process of developing a direct market strategy but the transition from existing sales channel is not simple. Dell continues to gain market share by using its knowledge about its customers. First of all, the model eliminates the need to support a widespread network of wholesale and retail dealers, which allows them to avoid dealer mark-ups; avoids the higher inventory costs associated with the wholesale/retail channel and the competition for retail shelf space; and diminishes the high risk of obsolescence associated with products in a rapidly changing technological market. Supplier Relationships: Dell.s integrated supply chain allows it to keep only four days of inventory. Component price in computer industry falls almost 6% a week. The company can provide the component price decline to its customers quickly. In addition, Dell shares demand information with suppliers, so ensuring that inventory is kept to minimum. Dell also enhances cash flow by effectively paying suppliers after customers have settled invoices. Dells relationship with their suppliers has played a key role in their success story. They have found a way to get most suppliers to keep components warehoused within minutes from Dells factories in Austin, Penang, Malaysia, and Limerick, Ireland. This has led them to reduce their number of suppliers from 204 in 1992, to only 47 today, all of whom have been willing to cooperate with their warehousing plan. These suppliers manage their own inventories, while they run parts to Dell as needed. The biggest advantage for Dell is that they dont get b illed for the components until they leave the suppliers warehouse. Dell doesnt take these components until an order is placed, which saves them a lot of money because the prices of PC parts can fall rapidly in just a few months. E-Commerce: Dell has developed a process whereby they can assess the lowest possible price within an hour. Dells e-commerce infrastructure allows dynamic pricing strategy, whereby the same product and service can be sold at different prices, depending on the buyer. As a result of their innovative transformation, Dell sells more than $30 million per day on the Internet, accounting for 30% of their overall revenue. Dell views the Internet as the most genuine and efficient form of their direct model, providing greater convenience and efficiency to customers as well as to Dell. Theoretical Model :- Supply Chain Disruption, both potential and actual are the enemies of all firm. Supply Chain disruption can be defined as Unplanned and Unanticipated event that has disrupted the normal flow of goods and material within a supply chain. Risk Prevails in three categories i.e Internal risk , External Risk and Network related risk( Juttner et al. 2002). Risk can be catogorised in variables. Variables suggested by Ritchie and Marshall ( 1993) include environment, industry, organisation , problem specific, decision maker related variables. Supply Chain Disruption:- Anything that affects the flow and supply of raw material, sub component, finished good from all the way from origin to the final demand point. On the basis of the severity of impacts and their likelihood or probability of occurrence, the major established attributes of disruption can be classified as follows: The most vital attribute of disruption is the inherent cause of disruption. For example, Murphy(2006) categorized disruptions into natural events, external man made events, and internal- man made events. Blizzards, labour strikes, and product recalls would be examples of each category respectively (Murphy 2006). Another vital attribute is on how many spheres or disciplines of the supply chain have been affected by a given disruption at one time. The third vital attribute is whether or not the disruption is associated an environmental change. Disruptions that cause an environmental change usually impact some form of the infrastructure for either a long time period or permanently. The fourth and the final attribute of disruption is the duration of the disruption itself. The framework tests the supply chain risks based on the above mentioned attributes and classifies them as deviation disruption or disaster, based on the severity of the disruption over the supply chain and the probability of occurrence as a parameter for risk calculation, assessment, prevention or mitigation. In order to see the different aspect of risk management in a supply chain, a frame work prepared by Manuj and Mentzer( 2008) has been reviewed.The schematic diagram of the framework is shown below. The framework is created in view with firms having a global outreach who source from different countries. This framework provided is a comprehensive one with both risk management and mitigation factors incorporated in to it. This framework proved to be ideal for risk management and mitigation in Dell, a truly global firm. The framework adopts 5 step approach for Risk management and Mitigation. Risk Identification: Risk identification is an important stage in the risk management process. Consequently, by identifying a risk, decision-makers become aware of events that may cause disturbances. To assess supply chain risk exposures, the company must identify not only direct risks to its operations, but also the potential causes or sources of those risks at every significant link along the supply chain (Christopher  HYPERLINK #idb3et al.HYPERLINK #idb3, 2002). Hence, the main focus of supply chain risk analysis is to recognize future uncertainties to enable proactive management of risk-related issues. Risk Assessment and Evaluation: After the risk analysis, it is important to assess and prioritize risks to be able to choose management actions appropriate to the situation. One common method is to compare events by assessing their probabilities and consequences and put them in a risk map/matrix Risk Management Strategy: Different strategies are adopted for various risks according to their importance and nature. Various strategies are suggested in the framework, such as Avoidance, Postponement, Speculation, Hedging, Control, Risk Sharing/Transfer, Security etc. Implementation of Supply Chain Risk Management Strategy:- Once the various strategies have been decided, plans have to be made for implementing the strategies based on their priority. Mitigation of Supply Chain Risk: Mitigation is the most commonly considered risk management strategy. Mitigation involves fixing the flaw or providing some type of compensatory control to reduce the likelihood or impact associated with the flaw. A common mitigation for a technical security flaw is to install a patch provided by the vendor. Sometimes the process of determining mitigation strategies is called control analysis. Expansion of the Framework and explanation of Potential Source of Disruption Recovery:- The global SCRM frame work designed by Manuj and Mentzer (2008) was applied on the Dells Value chain to analyze and identify the Risk. The framework was expanded and broken in to various stage and then applied to the Dell Value Chain. Risk Identification: In this phase various risk were identified by brain storming. The risks were classified in the following sub heads. Supply Risk: This includes of Wrong Supplier selection ,Natural Calamity like Earthquake, Hurricane, Low Inventory levels, Quality Issues , Supply disruption and Price escalation. Operations Risk: This includes Exchange Rate, Country Factors, and Virtual integration network breakdown. Demand Risk: This includes New Competitor, Technology Changes and Demand Fluctuation. Security Risk:- This includes Information system breach and Freight breaches. Risk Assessment and Evaluation: In this phase we have calculated the RPN number. Probability and impact of disruption were quantifies on the scale of 1 to 10 based on the hypothesis on the most severe to be 10 and the least severe to be 1.Eventually the most probable to be 10 and the least probable to be 1. Multiplying the Probability and Probability, RPN was calculated. Risk Management:- In this phase we have suggested the various ways by which an organization can minimize the impact by the risk which were identified in the Risk identification. Risks having high RPN number such as Supply Disruption , Low inventory Level should be attacked first, gradually coming down to the lesser RPN numbers and taking proper measure to minimize the risk. Risk Mitigation: Identifying the severity of disruption, risk mitigation strategy was defined. The academic framework by Manuj and Mentzer(2008) was tested hypothetically over the case of severe supply chain disruption faced by Dell and other computer systems manufacturer, during the time when Taiwan, one of the largest manufacturing base for semiconductor and motherboard production and assembly, suffered an earthquake, which is critically analysed as an unplanned unorganised risk for any functional supply chain in the manufacturing scenario.. After the step wise approach of finalising the framework and implying and expanding it over a real time already occurred situation of crisis it was inferred that severe supply chain disruptions have a great impact on the firm. The existence of a clearly articulated risk management plan for disaster-induced supply disruptions has not appeared in Dells official announcements during the six month period after the event in Taiwan. The inherent supply chain agility of this CDM Company, however, offered it several means of recourse during the month that followed the disruption. Dell operates on a configure-to-order basis, thus the final decision on product configuration rests with Dells customer. The moment an inputs price increases, customers may modify their configuration preferences by requesting less of the expensive input. Veverka (1999) reports that Dell changed its marketing strategy after the Taiwan earthquake in an effort to shift consumer preferences towards low memory products. A second ingredient of Dells supply chain strategy, long-term contracts with suppliers, did not deliver steady prices; despite expectations to the contrary in the PC industry press (Deckmyn, 1999). Baljko-Shah (2000) reports that Dell was forced to buy regular DRAM memories after the Taiwan earthquake, while their prices were high. Dell was planning to incorporate in its most innovative product line best-available technology memories (RDRAM). Contrary to earlier announcements, computer processor unit (CPU) suppliers did not make available on time CPUs compatible with the new technology memories. Dell ended up buying conventional memories during the earthquake-induced shortage in order to meet advertised commitments to increased memory capability in its innovative products. Dell Computer Co. (2000a) announced that during the fourth quarter of 1999 it lost $300 million in revenue. With respect to the framework by Manuj and Mentzer ( 2008) , the disruption at dell, in the case of earthquake in Taiwan at the supplier base, disrupting the dells supply chain can be covered by deploying the Risk resilience. The key points to mitigate the damages caused by the Supply Chain disruption are recommended as below. Postponement of Risk :- Postponement entails delaying the actual commitment of resources to maintain flexibility and delay incurring costs (Bucklin, 1965). It appeared that an increasing trend toward off-shoring provided a motivation for form postponement. Yang et al. (2004) also argue that with increasing attention to mass customization, agile operations, and e-business strategies, there should be more interest in postponement; however, there has been an absence of empirical research supporting this implication. Since global supply chains face high risks, postponement becomes increasingly valuable as the proportion of off-shore components in the final product increases. Therefore, as a preliminary observation, we believe that as the proportion of off-shore components in the final product increases, the likelihood of a supply chain considering investment in form postponement will increase. Speculation of Risk: Speculation (also called selective risk taking) is a demand-side risk management strategy that is the opposite of postponement (Bucklin, 1965). It includes such actions as forward placement of inventory in country markets, forward buying of finished goods or raw material inventory, and early commitment to the form of a product, all in anticipation of future demand. In the interviews, speculation emerged as the most commonly used strategy to address uncertainty in the business Environment: Hedging of Risk: In a global supply-chain context, hedging is undertaken by having a globally dispersed portfolio of suppliers and facilities such that a single event (like currency fluctuations or a natural disaster) will not affect all the entities at the same time and/or in the same magnitude. For example, dual sourcing can be used as a hedge against risks of quality, quantity, disruption, price, variability in performance, and opportunism (Berger et al., 2004), but dual sourcing requires more investment than single sourcing. Transfer of Risk:- The transfer of risk primarily encompasses a risk sharing strategy in a case of severe supply disruption by sharing it with 3rd party suppliers and allies. CONCLUSION, RECOMMENDATION, IMPLICATION FOR FUTURE RESEARCH:- Conclusion:- Supply chain risk management is a decision process often requiring a multidisciplinary approach. Typically, risk mitigation and contingency planning entails skills in operations strategy and supply chains. After a close analysis of the Dell Direct Supply Chain system considering the impact of the Taiwan earthquake on the dell by the frame work developed by Munoj and Mentzer ( 2008). The overall objective of the framework is to reduce the impact of disruption and understanding the various factors that play a role in the post- disruption recovery and decision making process. Dell Computers doctrinal commitment to minimal inventories, however, is well known. Companies with similar strategic commitments are unlikely to be interested in risk mitigation policies involving emergency inventories along the supply chain. In this case, risk transfer is left as the main option to consider, including contracts with emergency suppliers and insurance contracts. In light of Kunreuther and Bantwals (2000) discussion on rigidities in the successful introduction of Cat-Bonds, one alternative risk transfer instrument, the latter task may be challenging strategy to apply, but appears to be worth the effort. Scope for Future Research :- The Supply chain Disruption Management framework and disruption management process model have areas of interest that have not been able to be explored in this research leaving multiple area for future research. First area of research is understanding of the decision making process and its operational and behavioural factors. Second area of future research is the impact on the risk that disruption and firm strategies have. Putting to practice supply chain theories in order to bridge supply chain strategy with company financial performance is a daunting task. Supply chain theory attempts to clarify the complex interconnections among many actors in supply networks. Yet, it is unclear whether simple formulas for supply chain performance, encompassing a few variables, will have general application to business practice. In addition, it is difficult to design empirical studies that would isolate the effect of supply chain strategy on business performance from other company decisions and environmental variables. The study of supply chain disruptions may provide an interesting exception to the latter restriction, in that disruption impact may test whether supply chain management affects Company risk structure. There is a fast growing literature on alternative methods of risk transfer. It would be interesting to explore whether the latter methods may shield customised product direct marketing companies from investors uneasiness after disruptions in component markets.

Wednesday, November 13, 2019

The History and Theory of Magical Realism Essay -- Literature Essays L

The History and Theory of Magical Realism      Ã‚  Ã‚   Fantasy, Magical, Supernatural, Sublime, and Realism are all several genres of literature that may be familiar to many people. However, there may be one that is not as well-known as these: Magical Realism. Although Magical Realism is mostly common in the Latin American countries, one may wonder where and how Magical Realism got its start. On the other hand, one may simply wonder what some of the characteristics of Magical Realism are. By looking at the history and theory of Magical Realism as well as some of its characteristics and influences, these questions will be answered. Interestingly, the term "Magical Realism" was first used in 1925 by a German art critic, Franz Roh. In his essay, "Magic Realism: Post-Expressionism," Roh used the term "Magical Realism" to actually characterize a style of painting instead of a style of literature (15). However, there are still at least two different viewpoints as to where and when Magical Realism truly had its start. In Angel Flores' essay, "Magical Realism in Spanish America," he claims that Magical Realism had its basis in the works of Franz Kafka. Furthermore, Flores thinks that the year 1935 was the year that Magical Realism had its beginning in Latin America because this was the year that Jorge Luis Borges' work, A Universal History of Infamy, appeared in Buenos Aires. After the appearance of Borges' works, several other writers began to follow his style, giving Magical Realism its rise in popularity in the years of 1940 to 1950 (Flores 113). In his essay "Magical Realism in Spanish American Literature" Luis Leal disagrees with Flores' viewpoint. Leal does not think that Magical Realism had its growth during the 1940 to 195... ...Ed. Lois Parkinson Zamora and Wendy B. Faris. Durham, N.C.: Duke UP, 1995: 125-141. Flores, Angel. "Magical Realism in Spanish American Fiction." Magical Realism. Theory, History, Community. Ed. Lois Parkinson Zamora and Wendy B. Faris. Durham, N.C.: Duke UP, 1995: 109-116. "Garcia Marquez - Biography." 14 Jan. 2001 <http://www.themodernword.com/gabo/gabo_biography.html.>. Leal, Luis. "Magical Realism in Spanish American Literature." Magical Realism. Theory, History, Community. Ed. Lois Parkinson Zamora and Wendy B. Faris. Durham, N.C.: Duke UP, 1995: 119-123. "Magical Realism." 8 Jan. 2001 <http://www.iskl.edu.my/~Breen_O'Reilly/Chronicle2/page2.html>. Roh, Franz. "Magic Realism: Post-Expressionism." Magical Realism. Theory, History, Community. Ed. Lois Parkinson Zamora and Wendy B. Faris. Durham, N.C.: Duke UP, 1995: 15-30. Â